Results 71 to 80 of about 30,415 (268)
Efficient verifiable searchable encryption with search and access pattern privacy
Searchable encryption (SE) enables data users to securely search encrypted data stored in untrusted cloud servers. However, most SE schemes allow for leakages of access and search patterns to maximize efficiency and functionality.
Wu Axin +4 more
doaj +1 more source
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting.
Hossein Pilaram +2 more
doaj +1 more source
ABSTRACT Amid rising food and fertilizer prices, understanding farmers' policy preferences is critical for effective crisis response. We use best‐worst scaling experiment to assess Kenyan mobile‐owning crop farmers' preferences for government support under high and normal price scenarios.
Mywish K. Maredia +4 more
wiley +1 more source
ABSTRACT Food systems have a significant impact on environmental sustainability, underscoring the need for innovative technologies to support more sustainable agricultural methods. However, the adoption of these technologies hinges on consumer acceptance, making the analysis of consumer perceptions essential.
Greta Castellini, Guendalina Graffigna
wiley +1 more source
La veritat de la Viquipèdia [PDF]
What does it mean to assert that Wikipedia has a relation to truth? That there is, despite regular claims to the contrary, an entire apparatus of truth in Wikipedia?
Tkacz, Nathaniel
core +1 more source
Large Language Model in Materials Science: Roles, Challenges, and Strategic Outlook
Large language models (LLMs) are reshaping materials science. Acting as Oracle, Surrogate, Quant, and Arbiter, they now extract knowledge, predict properties, gauge risk, and steer decisions within a traceable loop. Overcoming data heterogeneity, hallucinations, and poor interpretability demands domain‐adapted models, cross‐modal data standards, and ...
Jinglan Zhang +4 more
wiley +1 more source
Roadmap on Artificial Intelligence‐Augmented Additive Manufacturing
This Roadmap outlines the transformative role of artificial intelligence‐augmented additive manufacturing, highlighting advances in design, monitoring, and product development. By integrating tools such as generative design, computer vision, digital twins, and closed‐loop control, it presents pathways toward smart, scalable, and autonomous additive ...
Ali Zolfagharian +37 more
wiley +1 more source
Is Assessment for Learning Really Assessment?
This opinion piece questions the legitimacy of treating assessment for learning (AfL) as assessment. The distinction between testing and assessment is first made, then the defining characteristics of contemporary AfL are identified.
Gavin T. L. Brown, Gavin T. L. Brown
doaj +1 more source
Why Just Boogie? Translating Between Intermediate Verification Languages
The verification systems Boogie and Why3 use their respective intermediate languages to generate verification conditions from high-level programs. Since the two systems support different back-end provers (such as Z3 and Alt-Ergo) and are used to encode ...
Ameri, Michael, Furia, Carlo A.
core +1 more source
Development of a Mathematical Model of Operation Reliability of Mine Hoisting Plants
The work analyzes the performance assurance of mine hoisting machines, including the problem of the quality of performance of the functions. The quality of functioning allows evaluation of a set of properties of the process of lifting loads, designed to ...
Pavel V. Shishkin +6 more
doaj +1 more source

